1 | -- | 3 | Kunwar Singh, C. Pandu Rangan, A. K. Banerjee. Guest Editorial: Special Issue on Cyber Security Protections and Applications |
4 | -- | 26 | Wolter Pieters, Zofia Lukszo, Dina Hadziosmanovic, Jan van den Berg. Reconciling Malicious and Accidental Risk in Cyber Security |
27 | -- | 37 | Jun Ye, Yong Ding, Xing-Zhong Xiong, Shu-Lin Wu. Dynamic Model for Anonymity Measurement Based on Information Entropy |
38 | -- | 54 | Hiroshi Fujinoki, Christopher A. Chelmecki, David M. Henry. Fail-Safe Security Architecture to Prevent Privacy Leaks from E-commerce Servers |
55 | -- | 69 | Shunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi. DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android |
70 | -- | 82 | Keying Li, Jianfeng Wang, Yinghui Zhang, Hua Ma. Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme |